Journal articles on the topic 'Data exfiltration attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data exfiltration attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zimba, Aaron, and Mumbi Chishimba. "Exploitation of DNS Tunneling for Optimization of Data Exfiltration in Malware-free APT Intrusions." Zambia ICT Journal 1, no. 1 (December 11, 2017): 51–56. http://dx.doi.org/10.33260/zictjournal.v1i1.26.
Full textUllah, Faheem, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, and Awais Rashid. "Data exfiltration: A review of external attack vectors and countermeasures." Journal of Network and Computer Applications 101 (January 2018): 18–54. http://dx.doi.org/10.1016/j.jnca.2017.10.016.
Full textDo, Quang, Ben Martini, and Kim-Kwang Raymond Choo. "A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers." IEEE Transactions on Information Forensics and Security 11, no. 10 (October 2016): 2174–86. http://dx.doi.org/10.1109/tifs.2016.2578285.
Full textMeyers, Vincent, Michael Hefenbrock, Dennis Gnad, and Mehdi Tahoori. "Leveraging Neural Trojan Side-Channels for Output Exfiltration." Cryptography 9, no. 1 (January 7, 2025): 5. https://doi.org/10.3390/cryptography9010005.
Full textSachintha, Shakthi, Nhien-An Le-Khac, Mark Scanlon, and Asanka P. Sayakkara. "Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems." Applied Sciences 13, no. 5 (February 24, 2023): 2928. http://dx.doi.org/10.3390/app13052928.
Full textSingh, Sanjeev Pratap, and Naveed Afzal. "The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration." International Journal of Network Security & Its Applications 16, no. 3 (May 29, 2024): 23–40. http://dx.doi.org/10.5121/ijnsa.2024.16302.
Full textChattra, Eka, and Obrin Candra Brillyant. "Implementation of Meltdown Attack Simulation for Cybersecurity Awareness Material." ACMIT Proceedings 7, no. 1 (July 7, 2021): 6–13. http://dx.doi.org/10.33555/acmit.v7i1.102.
Full textRietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.
Full textAcar, Gunes, Steven Englehardt, and Arvind Narayanan. "No boundaries: data exfiltration by third parties embedded on web pages." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 220–38. http://dx.doi.org/10.2478/popets-2020-0070.
Full textAksoy, Ahmet, Luis Valle, and Gorkem Kar. "Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection." Electronics 13, no. 2 (January 9, 2024): 293. http://dx.doi.org/10.3390/electronics13020293.
Full textMohamed, Nachaat. "Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework." F1000Research 11 (September 29, 2022): 422. http://dx.doi.org/10.12688/f1000research.109148.3.
Full textMohamed, Nachaat. "Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework." F1000Research 11 (May 25, 2022): 422. http://dx.doi.org/10.12688/f1000research.109148.2.
Full textMohamed, Nachaat. "Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework." F1000Research 11 (April 14, 2022): 422. http://dx.doi.org/10.12688/f1000research.109148.1.
Full textHagen, Raymond André, and Kirsi Helkala. "Complexity of Contemporary Indicators of Compromise." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 697–707. http://dx.doi.org/10.34190/eccws.23.1.2149.
Full textSabir, Bushra, Faheem Ullah, M. Ali Babar, and Raj Gaire. "Machine Learning for Detecting Data Exfiltration." ACM Computing Surveys 54, no. 3 (June 2021): 1–47. http://dx.doi.org/10.1145/3442181.
Full textWilson, PhD, Duane, and Jeff Avery. "Mitigating Data Exfiltration in SaaS Clouds." Journal of Business, Technology and Leadership 1, no. 1 (April 17, 2019): 9. http://dx.doi.org/10.54845/btljournal.v1i1.2.
Full textWillems, Daan, Katharina Kohls, Bob van der Kamp, and Harald Vranken. "Data Exfiltration Detection on Network Metadata with Autoencoders." Electronics 12, no. 12 (June 8, 2023): 2584. http://dx.doi.org/10.3390/electronics12122584.
Full textMundt, Michael, and Harald Baier. "Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update." International Journal on Cybernetics & Informatics 12, no. 5 (August 12, 2023): 43–59. http://dx.doi.org/10.5121/ijci.2023.120505.
Full textJabar, Farah H. A., Janatul Islah Mohammad, Ahmad Faizal Mohd Zain, and Abu Bakar Hasan. "Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (May 1, 2018): 490. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp490-497.
Full textMasters, Andrew, and Vijay K. Madisetti. "Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters." Journal of Information Security 15, no. 04 (2024): 433–47. http://dx.doi.org/10.4236/jis.2024.154025.
Full textAbualghanam, Orieb, Hadeel Alazzam, Basima Elshqeirat, Mohammad Qatawneh, and Mohammed Amin Almaiah. "Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning." Electronics 12, no. 6 (March 20, 2023): 1467. http://dx.doi.org/10.3390/electronics12061467.
Full textAl-Kadhimi, Amjed Ahmed, Manmeet Mahinderjit Singh, and Mohd Nor Akmal Khalid. "A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence Techniques." Applied Sciences 13, no. 14 (July 10, 2023): 8056. http://dx.doi.org/10.3390/app13148056.
Full textHakim, Arif Rahman, Kalamullah Ramli, Muhammad Salman, and Esti Rahmawati Agustina. "Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies." IIUM Engineering Journal 26, no. 1 (January 10, 2025): 420–36. https://doi.org/10.31436/iiumej.v26i1.3547.
Full textLi, Richard, and Michail Tsikerdekis. "Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average." Journal of Cybersecurity and Privacy 3, no. 3 (August 1, 2023): 435–50. http://dx.doi.org/10.3390/jcp3030022.
Full textAntić, Vladimir, Danijela Protić, Miomir Stanković, Radomir Prodanović, Miodrag Manić, Gordana Ostojić, Stevan Stankovski, and Denis Kučević. "Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling." Applied Sciences 14, no. 11 (June 3, 2024): 4830. http://dx.doi.org/10.3390/app14114830.
Full textKarthikeyan, Swathi Priya. "Rising Threat of AI-Driven Cybersecurity Attacks: Implications for National Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 9 (September 30, 2024): 756–62. http://dx.doi.org/10.22214/ijraset.2024.64042.
Full textChignell, Mark H., Mu-Huan Chung, Yuhong Yang, Greg Cento, and Abhay Raman. "Human Factors in Interactive Machine Learning: A Cybersecurity Case Study." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (September 2021): 1495–99. http://dx.doi.org/10.1177/1071181321651206.
Full textSalat, Lehel, Mastaneh Davis, and Nabeel Khan. "DNS Tunnelling, Exfiltration and Detection over Cloud Environments." Sensors 23, no. 5 (March 2, 2023): 2760. http://dx.doi.org/10.3390/s23052760.
Full textIvanova, Vanya, Tasho Tashev, and Ivo Draganov. "Detection of IoT based DDoS Attacks by Network Traffic Analysis using Feedforward Neural Networks." International Journal of Circuits, Systems and Signal Processing 16 (January 15, 2022): 653–62. http://dx.doi.org/10.46300/9106.2022.16.81.
Full textBiberaj, Aleksander, Enida Sheme, Alban Rakipi, Sonila Xhaferllari, Renalda Kushe, and Mirjeta Alinci. "Cyber Attack Against E-Albania and Its Social, Economic and Strategic Effects." Journal of Corporate Governance, Insurance, and Risk Management 9, no. 2 (December 31, 2022): 341–47. http://dx.doi.org/10.56578/jcgirm090204.
Full textS. Shangavi and Dr. T. Suresh Kumar. "A Covert Timing Channels Data Encryption Sceme In Cloud Simulation." South Asian Journal of Engineering and Technology 14, no. 2 (April 30, 2024): 7–10. http://dx.doi.org/10.26524/sajet.2023.14.3.
Full textGhali, Abdulrahman Aminu, Rohiza Ahmad, and Hitham Alhussian. "A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach." Electronics 10, no. 11 (May 27, 2021): 1282. http://dx.doi.org/10.3390/electronics10111282.
Full textAlazzam, Hadeel, Aryaf Al-Adwan, Orieb Abualghanam, Esra’a Alhenawi, and Abdulsalam Alsmady. "An Improved Binary Owl Feature Selection in the Context of Android Malware Detection." Computers 11, no. 12 (November 30, 2022): 173. http://dx.doi.org/10.3390/computers11120173.
Full textVetter, Michael. "MODEL-BASED SECURITY ANALYSIS OF FPGA DESIGNS THROUGH REINFORCEMENT LEARNING." Acta Polytechnica 59, no. 5 (November 1, 2019): 518–26. http://dx.doi.org/10.14311/ap.2019.59.0518.
Full textYu, Jiyong, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, and Christopher W. Fletcher. "Speculative taint tracking (STT)." Communications of the ACM 64, no. 12 (December 2021): 105–12. http://dx.doi.org/10.1145/3491201.
Full textFakiha, Bandr Siraj. "Forensic analysis of bad USB attacks: A methodology for detecting and mitigating malicious USB device activities." Edelweiss Applied Science and Technology 8, no. 5 (September 19, 2024): 1090–100. http://dx.doi.org/10.55214/25768484.v8i5.1809.
Full textHaytham.B. Alaboodi. "Challenges and Recommendations for Improving Blockchain-Based Bank Transfer Security in 5G IoT Applications." Journal of Electrical Systems 20, no. 11s (November 16, 2024): 1642–52. https://doi.org/10.52783/jes.7559.
Full textAnam, Fahri Choirul, Gusti Made Arya Sasmita, and I. Putu Agus Eka Pratama. "Implementation of Security Information and Event Management (SIEM) for Monitoring IT Assets Using Alienvault OSSIM (Case Study: Udayana University Information Resources Unit)." JITTER : Jurnal Ilmiah Teknologi dan Komputer 4, no. 3 (November 19, 2023): 1956. http://dx.doi.org/10.24843/jtrti.2023.v04.i03.p03.
Full textChinedu Jude Nzekwe and Christopher J Ozurumba. "Advanced modelling techniques for anomaly detection: A proactive approach to database breach mitigation." International Journal of Science and Research Archive 13, no. 2 (December 30, 2024): 2839–909. https://doi.org/10.30574/ijsra.2024.13.2.2511.
Full textMartins, Cláudio, and Ibéria Medeiros. "Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–39. http://dx.doi.org/10.1145/3530977.
Full textAnbalagan, E., Dr P. S. V. Srinivasa Rao, Dr Amarendra Alluri, Dr D. Nageswari, and Dr R. Kalaivani. "Improving Intrusion Detection using Satin Bowerbird Optimization with Deep Learning Model for IIoT Environment." International Journal of Electrical and Electronics Research 12, no. 1 (March 20, 2024): 219–27. http://dx.doi.org/10.37391/ijeer.120131.
Full textMundt, Michael, and Harald Baier. "Threat-based Simulation of Data Exfiltration Towards Mitigating Multiple Ransomware Extortions." Digital Threats: Research and Practice, October 29, 2022. http://dx.doi.org/10.1145/3568993.
Full textLeevy, Joffrey L., John Hancock, Taghi M. Khoshgoftaar, and Jared M. Peterson. "IoT information theft prediction using ensemble feature selection." Journal of Big Data 9, no. 1 (January 6, 2022). http://dx.doi.org/10.1186/s40537-021-00558-z.
Full textJian Malik Hidayat, Herri Setiawan, and Tasmi. "ANALISA MALWARE PADA TRAFFIC JARINGAN BERBASIS POLA LALU LINTAS DATA MENGGUNAKAN METODE ANOMALY." PROSIDING SNAST, November 23, 2024, E250–258. https://doi.org/10.34151/prosidingsnast.v1i1.5109.
Full textYeboah-Ofori, Abel, and Francisca Afua Opoku-Boateng. "Mitigating cybercrimes in an evolving organizational landscape." Continuity & Resilience Review, March 21, 2023. http://dx.doi.org/10.1108/crr-09-2022-0017.
Full textR, Janaki, Prathap S, Raman R, Tony Wilson I, and Yuvaraj J. "SECURE MULTI CLOUD STORAGE APPROACH FOR MULTICLOUD ENVIRONMENTS USING FOG COMPUTING." ShodhKosh: Journal of Visual and Performing Arts 4, no. 1 (June 30, 2023). https://doi.org/10.29121/shodhkosh.v4.i1.2023.2928.
Full textAçıkgözoğlu, Enes. "COMPARISON OF MACHINE LEARNING ALGORITHMS FOR DETECTION OF DATA EXFILTRATION OVER DNS." Yalvaç Akademi Dergisi, August 20, 2024. http://dx.doi.org/10.57120/yalvac.1507402.
Full textTaofeek, Olayiwola Tokunbo, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara, and Oludare Isaac Abiodun. "A COGNITIVE DECEPTION MODEL FOR GENERATING FAKE DOCUMENTS TO CURB DATA EXFILTRATION IN NETWORKS DURING CYBER-ATTACKS." IEEE Access, 2022, 1. http://dx.doi.org/10.1109/access.2022.3166628.
Full textKozlenko, Oleh, and Dmytro Zibarov. "Analysis of the core research for vendor email compromise filtering model using machine learning." Theoretical and Applied Cybersecurity 5, no. 1 (September 19, 2023). http://dx.doi.org/10.20535/tacs.2664-29132023.1.284121.
Full textPatharkar, Anay. "Analysis of Various Malicious Payload Deployment Cables." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 07 (July 11, 2023). http://dx.doi.org/10.55041/ijsrem24367.
Full text